Login / Signup
Identifying gaps in IT retail Information Security policy implementation processes.
Ileen E. van Vuuren
Elmarie Kritzinger
Conrad Mueller
Published in:
InfoSec (2015)
Keyphrases
</>
security policies
databases
access control
information sharing